Bug 1146334 - (CVE-2017-18550) VUL-1: CVE-2017-18550: kernel-source: potential exposure of kernel stack memory because aac_get_hba_info does not initialize the hbainfo structure
(CVE-2017-18550)
VUL-1: CVE-2017-18550: kernel-source: potential exposure of kernel stack memo...
Status: RESOLVED UPSTREAM
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P5 - None : Minor
: ---
Assigned To: E-mail List
Security Team bot
https://smash.suse.de/issue/240424/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2019-08-20 10:03 UTC by Alexandros Toptsoglou
Modified: 2019-08-20 10:06 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexandros Toptsoglou 2019-08-20 10:03:22 UTC
CVE-2017-18550

An issue was discovered in drivers/scsi/aacraid/commctrl.c in the Linux kernel
before 4.13. There is potential exposure of kernel stack memory because
aac_get_hba_info does not initialize the hbainfo structure.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-18550
http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-18550.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18550
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=342ffc26693b528648bdc9377e51e4f2450b4860
Comment 1 Alexandros Toptsoglou 2019-08-20 10:06:33 UTC
all 4.12 branches include the patch. 4.4 branches and older are not affected with the exception of SLE12-SP3 which added/backported the vulnerable function. SLE12-SP3 has also received the fix.